Scenario: A Citrix Architect must complete a XenApp and XenDesktop security assessment. After examining the network topology for the hypervisor hosts supporting the Virtual Delivery Agent (VDA) machines, the architect finds that some of the network connections are NOT following leading security practices.
Click the Exhibit button to view a high-level diagram which shows the connectivity between various components.
Which three of the labeled areas of the diagram represent connections which are NOT following Citrix leading security practices? (Choose three.)
A. G
B. B
C. A
D. E
E. F
F. D
G. C
Scenario: A Citrix Architect needs to redesign an existing XenApp and XenDesktop environment to use Machine Creation Services (MCS). During the design discussions, the locations for the MCS-provisioned thin clone machine disks are proposed as shown in the Exhibit.
Click the Exhibit button to view the details.
Which potential concern should the architect address with the customer before proceeding with this configuration? (Choose two.)
A. It is limited to NFS shared storage.
B. It will require substantial read IOPS from the shared storage location during machine creation and updates.
C. It will require substantial write IOPS to the shared storage location as temporary data is written.
D. It will require more storage to be allocated on the VM hosts compared with other options.
E. It is limited to certain hypervisors.
Scenario: While assessing the User Layer, a Citrix Architect finds that most of the internal users connect using corporate-owned laptops, desktop devices, and thin clients. Many of these laptops and desktop devices are running Windows 10, while the remainder of the machines are running Windows 7 and are in the process of being migrated to Windows 10. Some users also connect using personal devices.
Currently, Citrix Receiver is manually installed on any endpoint device added to the company. All these devices use Citrix Receiver version 4.8 and above. Some of the internal users with Windows laptops are experiencing issues in which devices such as a keyboard, mouse, a monitor connected to a docking station or a USB hub are NOT usable in an HDX session.
Which action should the architect recommend to provide a uniform user experience for all users?
A. Recreate user accounts in Active Directory
B. Upgrade all clients to the latest version of Citrix Receiver
C. Upgrade drivers of peripheral devices
D. Recreate user profiles
Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop environment for a bank. After the project kickoff meeting, the following business drivers have been identified and prioritized in the following order:
1.
Increase security
2.
Reduce costs
3.
Improve the user experience
4.
Simplify management
Later in the design process, the architect documents the design decisions shown in the Exhibit (only some are shown).
Click the Exhibit button to view the design decisions.
During the quality assurance review, the architect observes that one of these design decisions does NOT align with the business driver priorities.
Which design decision should be changed to match the prioritization of the business drivers?
A. Images
B. Profiles
C. Authentication Methods
D. Citrix Policies
Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop environment. The customer is interested in using Machine Creation Services with App Layering in the environment.
Which consideration would result in the architect recommending that the customer use a different image and application management approach?
A. The environment must use XenApp Enterprise concurrent licensing.
B. PXE is required for non-Citrix machines in the networks which will support the Virtual Delivery Agent (VDA) machines.
C. Microsoft Hyper-V hosts must be used to host the Virtual Delivery Agent (VDA) machines.
D. The machines must use an existing SAN deployment.
E. The images must be deployed to physical machines.
Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop environment.
The architect has determined the applications and characteristics listed in the Exhibit during the application
assessment.
Click the Exhibit button to view the list of applications and characteristics.
To which application category does Application1 belong, based on the information provided in the Exhibit?
A. Management Apps
B. Common Apps
C. User Apps
D. Departmental Apps
Scenario: A Citrix Architect must perform a Provisioning Services (PVS) design for a healthcare organization. The initial design places all PVS farm components in the organization's primary datacenter. The customer asks whether the vDisk can be streamed from PVS servers in the primary datacenter to target devices located in a secondary datacenter in another region while maintaining good performance. The datacenters are connected with a 10 GB link with approximately 20 ms of latency.
The architect recommends against the organization pursuing this approach.
Which statement is a relevant reason for the recommendation?
A. The configuration does NOT provide sufficient bandwidth for streaming traffic.
B. This configuration does NOT provide sufficient connectivity between the PVS servers and the farm database
C. This configuration prevents the Subnet Affinity feature from being implemented.
D. This configuration would include too much latency for the streaming traffic.
Scenario: A Citrix Architect designed an environment where policies will be deployed using Workspace Environment Management (WEM). The architect decided to install two WEM Infrastructure Services servers in order to meet the expected load in the environment.
What should the architect do to ensure that both servers can be utilized in the environment?
A. Enter both server names in the Agent Host Configuration so that both servers will be actively contacted.
B. Configure a load-balancing virtual IP (VIP) on a Citrix ADC appliance so that both servers can actively receive communications.
C. Enter both server names in the Agent Host Configuration; the first server listed will be contacted first; the second server will be in a standby capacity until needed.
D. Configure two virtual IPs (VIPs) on a Citrix ADC appliance: one for the primary server, and one for the backup server.
Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop environment. Provisioning Services has been selected for image management. The Provisioning Services vDisk store requires high fault tolerance and the ability to support dual drive failure.
Which two RAID levels could the architect use for the Provisioning Services vDisk store? (Choose two.)
A. RAID 5
B. RAID 0
C. RAID 1
D. RAID 6
E. RAID 10
Scenario: While assessing the User Layer, a Citrix Architect finds that most of the internal users connect using corporate-owned laptops, desktop devices, and thin clients. Many of these laptops and desktop devices are running Windows 10, while the remainder of the machines are running Windows 7 and are in the process of being migrated to Windows 10. Some users also connect using personal devices which have Receiver Desktop Lock installed.
Currently, Citrix Receiver is manually installed on any endpoint device added to the company. All these devices use Citrix Receiver version 4.8 and above. The IT team is planning to automate a process to update all the devices with the latest version of Citrix Receiver and to automate another process for automatic installation of Citrix Receiver without incurring extra costs and maintenance.
During the initial testing of the Citrix Receiver Auto-Update feature, the architect observed that the Citrix Receiver Auto-Update feature does NOT work on some of the machines.
Which two reasons could be causing this issue? (Choose two.)
A. Citrix Receiver Auto-Update is disabled on machines where Receiver Desktop Lock is installed.
B. The Citrix receiver Auto-Update feature needs to be configured before Receiver Desktop Lock is configured.
C. The user does NOT have local administrative permission on the endpoint device.
D. The local Advanced Preferences within Citrix Receiver were incorrectly configured.